头像

姓名:高星

职称:博士生导师

联系电话:

办公地址:经管楼B405室

个人主页:

邮箱:emgx@seu.edu.cn

教育背景

管理学博士,系主任,博士生导师

学术兼职

中国管理科学与工程学会协同创新与管理研究会常务理事

中国系统工程学会青年工作委员会委员

中国信息系统协会理事

研究领域

电子商务与人工智能

新兴技术管理

技术创新管理

供应链管理

研究课题

国家自然科学基金项目:信息系统安全利益相关者之间的博弈关系分析和激励策略研究,主持

江苏高校哲学社会科学研究重大项目:黑客地下产业链的运行机理及治理机制研究,主持

国家重点研发计划课题:不同主题示范区可持续发展动态演化态势及其驱动机制,参与

奖励与荣誉

入选东南大学至善青年学者资助计划(A类)

学术成果

第一作者

[1] A duopolistic analysis of CEO competitive aggressiveness with R&D investment. Production and Operations Management, 2024. (UTD 24 Journals)

[2] Competition between proprietary and open source vendors with security concerns. Technology Analysis & Strategic Management, 2024, 36(3):592-604.

[3] Information security outsourcing in a resource-sharing environment: the impacts of attack modes. Journal of the Operational Research Society, 2023.

[4] Information sharing and security investment for substitutable firms: A game-theoretic analysis. Journal of the Operational Research Society, 2023.

[5] Information security investment with budget constraint and security information sharing in resource-sharing environments. Journal of the Operational Research Society, 2023.

[6] Competitive analysis of R&D investment with R&D budget constraint and R&D uncertainty. Managerial and Decision Economics, 2023, 44 (4): 2438-2456.

[7] Information security investment for complementary and substitutable firms: The role of technology similarity. Expert Systems with Applications, 2023, 225: 120129.

[8] A competitive analysis of information security investment: The role of hacker attacks. Journal of Industrial and Management Optimization, 2023, 19(8): 6104-6129.

[9] R&D subsidy and output subsidy in a duopoly: the role of technology spillover and R&D budget. Australian Economic Papers, 2023, 62(3): 524-538.

[10] A competitive analysis of software quality investment with technology diversification and security concern. Electronic Commerce Research, 2023, 23: 2691-2712.

[11] Competitive information security investment under hacker knowledge dissemination. Journal of Industrial and Management Optimization, 2023, 19(6): 4199-4221.

[12] An economic analysis of information security outsourcing with competitive firms. Managerial and Decision Economics, 2022, 43(7): 2748-2758.

[13] An economic analysis of information security decisions with mandatory security standards in resource sharing environments. Expert Systems with Applications, 2022, 206: 117894.

[14] Open source or closed source? A competitive analysis with software security. Decision Analysis, 2020, 17(1): 56-73.

[15] A differential game approach to security investment and information sharing in a competitive environment. IIE Transactions, 2016, 48(6): 511-526.

[16] Economic incentives in security information sharing: the effects of market structures. Information Technology and Management, 2016, 17(4): 361-377.

[17] Should sophisticated expectations facilitate reaching equilibrium behavior? Operations Research Letters, 2016, 44(6): 812-817.

[18] Information security investment for competitive firms with hacker behavior and security requirements. Annals of Operations Research, 2015, 235(1): 277-300.

[19] Security investment and information sharing under an alternative security breach probability function. Information Systems Frontiers, 2015, 17(2): 423-438.

[20] A game-theoretic analysis of information sharing and security investment for complementary firms. Journal of the Operational Research Society, 2014, 65(11): 1682-1691.

[21] Information security investment when hackers disseminate knowledge. Decision Analysis, 2013, 10(4): 352-368.

[22] A game-theory approach to configuration of detection software with decision errors. Reliability Engineering & System Safety, 2013, 119: 35-43.

[23] A differential game approach to information security investment under hackers’ knowledge dissemination. Operations Research Letters, 2013, 41(5): 421-425.

[24] Stochastic evolutionary game dynamics and their selection mechanisms. Computational Economics, 2013, 41(2): 233-247.

[25] On local stability of Cournot models with simultaneous and sequential decisions. Mathematical Social Sciences, 2012, 63(3): 207-212.

其他作者

[26] Managing consumer privacy risk: The effects of privacy breach insurance. Electronic Commerce Research, 2023, 23(2): 807-841.

[27] Agency or wholesale? retail selling format in the presence of new manufacturer introduction. Electronic Commerce Research, 2023, 23(4): 2291-2325.

[28] Stay positive or go negative? Memory imperfections and messaging strategy. International Journal of Research in Marketing, 2022, 39(4): 1127-1149.

[29] Does local monopolistic approximation imply a less stable equilibrium? Operations Research Letters, 2018, 46(5): 510-513.

[30] Service competition in an online duopoly market. Omega, 2018, 77: 58-72.

[31] Online retailer recommender systems: a competitive analysis. International Journal of Production Research, 2017, 55(14): 4089- 4109.

[32] Stochastic evolutionary selection in heterogeneous populations for asymmetric games. Computational Economics, 2015, 45(3): 501-515.

招生信息

欢迎数理和英语基础较强、对科研兴趣浓厚的管理类相关专业学生报考硕士或博士研究生。